Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 219 (0.356 secs)
You searched for: subject:"Recon"
[1] 2 3 4 5     Next    Last
[movies]Recon film - Mark Broughton
recon film for Spits
Keywords: recon
Downloads: 121
[audio]The Tech Recon - Cody Krieger
A podcast about tech. All the biggest stories, and some of the smaller ones too.
Keywords: tech; tech recon; recon
Downloads: 307
[movies]Recon 2011 - Mach shellcodes and OS X injectable rootkits by Jesse D'Aguanno
Mach shellcodes and OS X injectable rootkits The mach subsystem on OS X has several interfaces which can be leveraged by an attacker to subvert the OS and write directly to the memory of other processes, including the kernel, allowing us to replace code, overwrite data structures, etc. I demonstrated some of these techniques and an example OS X kernel rootkit ("iRK") a couple of years ago at Black Hat...
Keywords: recon; rootkit
Downloads: 247
[texts]Ghost Recon
Team Ghost is a select group of four celebrity gamers brought together to promote the highly anticipated video game, Tom Clancy's Ghost Recon Future Soldier. Tom Clancy's Ghost Recon Future Soldier is a near future military shooter video game, coming on Playstation 3 and Xbox 360 in 2012. Ghost Recon Advanced Warfighter Game Guide Walkthrough - free video game guide and walkthrough. Solutions, secrets, maps, tips and lots more...
Keywords: Ghost Recon
Downloads: 15
[audio]06 Deceiver
Graves. Welcome to viper city
Keywords: Recon. albums
Downloads: 1
[movies]Recon 2011 - How to develop a rootkit for Broadcom NetExtreme network cards by Guillaume Delugré - Recon
(Bug: if the video is black use the QuickTime video instead) Among all possible devices, network cards are particularly interesting for a attacker wishing to develop a rootkit : - They offer direct communication with the attacker over the network link - They offer direct memory access to kernel physical pages over the PCI link Despite the fact that the feasability of a rootkit in a network card had already been considered (A...
Keywords: Recon; Rootkit
Downloads: 356
[movies]lecture: Keep your tentacles off my bus, introducing Die Datenkrake by Dmitry Nedospasov and Thorsten Schröder - Recon
In hardware security analysis, success and failure are predetermined by one's tools. Coping with overwhelming streams of data can be near impossible in software alone. Implementing accurate timing can also prove to be challenging without a custom logic implementation. The solution to many of these issues is offloading much of the work to purpose-built dedicated logic. In this talk we introduce Die Datenkrake (DDK) a low-cost open source hardware project for hardware reverse engineering that impl...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 62
[movies]Recon 2013 - Apple iCloud services reversed inside out by Oleg Afonin - Recon
Apple iCloud was meant to improve flexibility and comfort when using your iDevices, however it also provides opportunities to extract as much as everything about the user. Apple iCloud was meant to improve flexibility and comfort when using your iDevices, however it also provides opportunities to extract as much as everything about the user. Backups: iCloud suggests backing up iMessage, SMS, photos and videos, device settings, documents, music and other things on-the-fly which is useful for sync...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 303
[movies]Recon 2013 - Reconstructing Gapz: Position-Independent Code Analysis Problem by Aleksandr Matrosov and Eugene Rodionov - Recon
This presentation is devoted to analysis one of the stealthiest bootkit seen in the wild – Win32/Gapz. The talk will cover not only remarkable features of the bootkit such as custom kernel-mode network protocol implementation, advanced bootkit technique and payload injection functionality but, also, the way the authors of the presentation approached the problem of analysis Win32/Gapz using the tools by Hex-Rays...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 139
[movies]Recon 2013 - Hiding @ Depth - Exploring & Subverting NAND Flash memory by Josh "m0nk" Thomas - Recon
In the world of digital storage, gone are the days of spinning platters and magnetic residue. These technologies have been replaced with electron trapping, small voltage monitoring and a lot of magic. These NAND devices are ubiquitous across our culture; from smart phones to laptops to USB memory sticks to GPS navigation devices. We carry many of these devices in our pockets daily without considering the security implications...
Keywords: Recon; Recon 2013; Reverse Engineering
Downloads: 107
[movies]Recon 2011 Gregory Kerr - Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API"
Checkpoint-Restart: Proprietary Hardware and the "Spiderweb API" This summary describes a package to transparently checkpoint and restart applications which run over Infiniband. Infiniband is rapidly growing as a high-speed interconnect, even appearing on departmental clusters. The current work grew out of the needs of high performance computing. As of November, 2010, 43% of the TOP500 supercomputers run Infiniband...
Keywords: Recon 2011, Recon, Reverse Engineering, Infiniband
Downloads: 57
[movies]Recon 2013 - I got 99 problems but a kernel pointer ain't one by Alex Ionescu
While Windows has been becoming a tighter and tighter ship with increased mitigations added each release, the local availability of kernel addresses has barely been addressed, except in the context of some ASLR bypasses in Windows 8. This presentation will collect many of the already-known info leaks in one single source, and then proceed by presenting some unknown and novel info leaks in the kernel...
Keywords: Recon; Recon 2013; Reverse Engineering; Alex Ionescu
Downloads: 125
[movies]Action Force Recon - Nathan
Homemade WW2 movie
Keywords: Action Force Recon
Downloads: 255
[movies]Action Force Recon - Nathan
Homemade WW2 movie
Keywords: Action Force Recon
Downloads: 180
[movies]Action Force Recon - Nathan
Homemade WW2 movie
Keywords: Action; force; recon
Downloads: 226
[movies]Recon 2005 - Matt Shelton - Passive Asset Detection System
Network scanners are a valuable resource in the security practitioner.s toolkit. They are used to actively probe a network in order to generate a snapshot of the current environment. However, they are not without limitations; they can be loud, resource intensive, and the results can be quickly outdated. During this presentation I will discuss how a passive scanner can be used to identify network traffic...
Keywords: Recon,Security,Conference
Downloads: 283
[texts]Jauja 22 ( Octubre 1968)
jauja 22 recon.
Keywords: jauja 22 recon
Downloads: 71
[texts]Ghost Recon 2
Ghost Recon 2 cheats XBox, Ghost Recon 2 cheat codes XBox, XBox cheats, cheatcodes, hints, tips, strategy guides. G4tv.com is the ultimate resource for Tom Clancy's Ghost Recon Advanced Warfighter 2. Featuring 6 videos and trailers, release date and more. Tom Clancy's Ghost Recon Future Soldier is a near future military shooter video game, coming on Playstation 3 and Xbox 360 in 2012. G4tv.com is the ultimate resource for Tom Clancy's Ghost Recon Advanced Warfighter 2...
Keywords: Ghost Recon 2
Downloads: 64
[movies]Action Force Recon - Nathan
homemade WW2 movie
Keywords: Action Force Recon
Downloads: 260
[texts]33 Septiembre 1969
Jauja 33 recon..
Keywords: Jauja 33 recon
Downloads: 136
[texts]21 Septiembre 1968
Jauja 21 recon..
Keywords: Jauja 21 recon
Downloads: 152
[texts]1 Enero 1967
Jauja 1 recon.
Keywords: Jauja 1 recon
Downloads: 666
[texts]Ghost Recon 2 Pc
Download Ghost Recon Advanced Warfighter 2 PC Fast and for Free. Experience the best Torrents right here. More Ghost Recon Advanced Warfighter 2 Pc available on. The following weapons can be seen in the video game Ghost Recon Advanced Warfighter 2 10+ items Tom Clancys Ghost Recon Future Soldier Khyber Stike DLC Pack Download Feb 26, 2013 ESRB Rating Mature. ghost recon 2 pc game free download - Ghost Recon Future Soldier The future of 3rd person shooters?, and much more programs...
Keywords: Ghost Recon 2 Pc
[movies]Footprinting, scoping and recon with DNS, Google Hacking and Metadata - Adrian Crenshaw
This class covers recon work, showing the student how a pen-tester/attacker can use public information to learn more about an organization before they compromise it's security. Covered topics will include DNS tools (like Whois, NSlookup/Dig, Nmap -sL), Google Hacking using advanced search terms and Metadata in images and documents. Recorded for the Kentuckiana ISSA on March 21, 2009.
Keywords: hacking recon issa irongeek
Downloads: 160
[texts]Jauja 22 ( Octubre 1968)
Jauja 22 recon
Keywords: Jauja 22 recon
Downloads: 5
[movies]Recon 2011 - Virtdbg by Damien Aumaitre - Recon
(Bug: if the video is black use the QuickTime video instead) This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors. The hypervisor is loaded "on the fly" with DMA requests and allow to debug the target without rebooting. The client part leverages the metasm framework. This presentation is about a remote kernel debugger leveraging the hardware virtualization facilities provided by modern processors...
Keywords: Recon; VirtDbg; Reverse Engineering
Downloads: 429
[movies]Recon 2005 - Fravia - Wizard searching: reversing the commercial web for fun and knowledge
Like a skilled native, the able seeker has become part of the web. He knows the smell of his forest: the foul smelling mud of the popups, the slime of a rotting commercial javascript. He knows the sounds of the web: the gentle rustling of the jpgs, the cries of the brightly colored mp3s that chase one another among the trees, singing as they go; the dark snuffling of the m4as, the different sounds and the rustling of the databases, the pathetic cry of the common user, a plaintive cooing that sli...
Keywords: recon,Security,Conference,search
Downloads: 3,688
[texts]Jauja 32 ( Agosto 1969)
Jauja 32 recon
Keywords: Jauja 32 recon
Downloads: 62
[texts]5 Mayo 1967
Jauja 5 recon..
Keywords: Jauja 5 recon
Downloads: 189
[texts]Jauja 20 ( Agosto 1968)
Jauja 20 recon
Keywords: Jauja 20 recon
Downloads: 62
[texts]Jauja 35 ( Noviembre 1969)
Jauja 35 recon
Keywords: Jauja 35 recon
Downloads: 64
[texts]28 Abril 1969
Jauja 28 recon..
Keywords: Jauja 28 recon
Downloads: 144
[texts]35 Noviembre 1969
Jauja 35 recon..
Keywords: Jauja 35 recon
Downloads: 153
[movies]Recon 2011 - Hardware Stuff for Software People By Stephen Ridley - Recon
This talk will be an introduction to doing "hardware stuff" stuff, for people accustomed to plying their trade against software. I will discuss how to build tools (and use existing tools) to sniff/spy on a variety of hardware communications channels from UART Serial (the kind in your computer) to the very ubiquitous SPI/I2C serial busses used in virtual everything (from EEPROM in your portable DVD player to the HDMI/VGA cables between your computer and monitor)...
Keywords: Recon; Hardware; Reverse Engineering
Downloads: 1,724
[texts]22 Octubre 1968
Jauja 22 recon..
Keywords: Jauja 22 recon
Downloads: 142
[movies]Recon 2005 - Jonathan Westhues - Practical Attacks on a Prox Card
`Proximity cards' are commonly used as high-tech replacements for magstripe cards or metal keys: you hold the card within a few inches of the reader, and the door clicks open. They are interesting because they are routinely used to control access to property or services. These cards contain electronic circuitry that authenticates them to the reader using a radio link. Many such systems are designed with no security at all...
Keywords: Recon,Security,Conference,search
Downloads: 610
[texts]Jauja 36 ( Diciembre 1969)
Jauja 36 recon
Keywords: Jauja 36 recon
Downloads: 83
[texts]Jauja 33 ( Septiembre 1969)
Jauja 33 recon
Keywords: Jauja 33 recon
Downloads: 52
[texts]Tom Clancy Ghost Recon
May 22, 2012 Ghost Recon Future Soldiers journey through development parallels that of fellow Tom Clancy and Ubisoft stablemate Splinter Cell Conviction. From Yahoo omg Tom Clancy's action-packed novels inspired not just films but dozens of video games. Check out GameDynamo's in-depth coverage for Tom Clancy's Ghost Recon Future Soldier for the Xbox 360. We have game news, reviews, videos, etc. Ghost Recon Network...
Keywords: Tom Clancy Ghost Recon
Downloads: 31
[texts]8 Agosto 1967
Jauja 8 recon..
Keywords: Jauja 8 recon
Downloads: 173
[texts]9 Septiembre 1967
Jauja 9 recon..
Keywords: Jauja 9 recon
Downloads: 158
[texts]18 Junio 1968
Jauja 18 recon..
Keywords: Jauja 18 recon
Downloads: 153
[texts]Jauja 23 ( Noviembre 1968)
Jauja 23 recon
Keywords: Jauja 23 recon
Downloads: 60
[texts]31 Julio 1969
Jauja 31 recon..
Keywords: Jauja 31 recon
Downloads: 154
[texts]3 Marzo 1967
Jauja 3 recon..
Keywords: Jauja 3 recon
Downloads: 212
[texts]24 Diciembre 1968
Jauja 24 recon..
Keywords: Jauja 24 recon
Downloads: 144
[texts]Ghost Recon Future Soldier
As a member of the elite Ghost Recon, you are among the few who possess the power, the adaptability, and the cognitive fortitude of the future soldier. After a troubled development, this Future Soldier looks more like a military game of the past. May 22, 2012 Check out all the Ghost Recon Future Soldier achievements, latest news, previews, interviews, videos, screenshots and review from your number one...
Keywords: Ghost Recon Future Soldier
Downloads: 46
[texts]36 Diciembre 1969
Jauja 36 recon..
Keywords: Jauja 36 recon
Downloads: 220
[texts]30 Junio 1969
Jauja 30 recon..
Keywords: Jauja 30 recon
Downloads: 141
[texts]32 Agosto 1969
Jauja 32 recon..
Keywords: Jauja 32 recon
Downloads: 139
[1] 2 3 4 5     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
movies
audio